Achive.php Cyber News Archives - Page 7 of 13 - The Cyber Shark

Ghibli glam or privacy scam? Chandigarh Cyber Cell issues advisory

Ghibli

The Chandigarh Police Cybercrime Cell has warned against rising online frauds involving fake Ghibli artwork and merchandise. Users are advised to stay alert, verify sources, and avoid suspicious links or offers to protect their data and finances. The Chandigarh Police Cybercrime Cell has issued a warning about possible frauds that pose as Ghibli artwork or items. Ghibli’s artificial intelligence (AI)-generated graphics have garnered a lot of attention in the past week. According to a Cybercrime Cell statement, these crimes can take many different forms, and both authors and fans should be mindful of the possible dangers that exist in the digital realm. Cybercriminals frequently create phoney internet shops or auction platforms that purport to sell Ghibli artwork or authentic items. These websites have the potential to send fake goods, steal personal information, or vanish after a transaction. Before making a purchase, always confirm the legitimacy and authenticity of websites, according to DSP (Cyber Cell) Venkatesh. According to the DSP, who briefed on several cyber scams that may involve Ghibli, phishing emails may be sent by fraudsters posing as Ghibli news or offers. These emails may contain links to phoney social media profiles or retail locations. The DSP warned that clicking on these links could result in the download of malware or the loss of personal data. According to reports, phoney Ghibli-related competitions or prizes are frequently employed as a means of obtaining user information or persuading users to download harmful programs. Additionally, some cybercriminals pass off malware or ransomware as downloaded content (like Ghibli wallpapers or art packs), which is how hazardous software is camouflaged as Ghibli art. According to the Cyber Cell, if a person downloads the content, harmful software may be placed on their device, which might lock or steal data. Regarding identity theft, the DSP stated that cybercriminals may fabricate websites or social media profiles that pose as artists, particularly fan artists, to obtain admirers’ personal information or even to sell phoney artwork. When interacting with creators or fan communities, exercise caution at all times. The Cyber Cell advised using platforms that let users confirm their identity, including verified social media accounts, and refraining from disclosing private information, such as credit card numbers unless you have faith in the platform. The Cyber Cell provided information on how to confirm authenticity, stating that you should always make sure that websites or accounts that sell Ghibli artwork, products, or content are authentic. Report any stolen Ghibli artwork or fake goods you come across to the appropriate authorities or websites. Purchase genuine goods and downloads from reputable, official websites to avoid fraud, DSP Venkatesh said. Furthermore, it’s best to avoid falling for offers that seem too good to be true, Especially when they come from unknown websites or unwanted emails. According to the DSP, you may safeguard your work and yourself against cybercrime involving Ghibli art by remaining aware and alert.

Maharashtra Cyber Corporation was formed to audit govt and Pvt. Firms’ preparedness for fraud

Maharashtra Cyber Corporation

The Maharashtra government has transformed its Cyber Command Center into the Maharashtra Cyber Corporation to strengthen cybersecurity readiness. It will audit and guide government and private firms on cyber fraud prevention. On April 1, 2025, the Maharashtra government formally transformed its Maharashtra Cyber Corporation Command Center into a cyber corporation that will investigate the state’s overall readiness for cyber security. It will serve as a guide for public and commercial organizations, as well as government departments, on safe cyber practices and cyber security. At a cabinet meeting last month, the idea to turn the MMaharashtra Cyber Corporation Police into a company was accepted. Maharashtra Cyber, which operated off of a floor at Cuffe Parade, received an upgrade last year when the state government invested Rs 838 crore and gave it the entire Mahape building in Navi Mumbai. An official added, “We will be guiding government and private companies in matters of cyber security. To make sure they don’t become victims of cyber fraud, this will be done. Private businesses will be subject to yearly audits and need to adhere to the security protocols established by the Corporation. According to the Government Resolution, the state government will own all of the corporation when it is formed under the Companies Act. The Corporation’s authorized share capital will be Rs 200 crore. The entire paid-up and subscribed share capital will come from the state government. This will cover the corporation’s first year’s necessary administrative costs, and any further administrative costs will be covered by the corporation’s revenue, the GR stated.

Chandigarh: A digital arrest fraud costs a retired colonel and his wife ₹3.4 cr.

Digital arrest

An elderly couple in Chandigarh was duped of ₹3.41 crore by scammers posing as ED officials, keeping them under a 10-day “digital arrest.” Police have recovered ₹6 lakh and advised residents to report suspicious calls. In Sector 2-A, an 82-year-old retired army officer named Colonel Dalip Singh and his 74-year-old wife, Ravinder Kaur Bajwa, have lost ₹3.41 crore to scammers posing as Enforcement Directorate (ED) employees. The deception occurred on March 18, when Bajwa was falsely accused of being implicated in a money laundering case by a caller from an unidentified number. The scammer asserted that Bajwa had reportedly received ₹20 lahks as commission for laundering ₹2 crores after selling his bank account details to Naresh Goyal, the jailed owner of Jet Airways, for ₹5 lakh. The scammers used a video chat to show Bajwa his ATM card and said they were looking into a ₹5,038-crore scam to make their plan seem genuine. Additionally, they falsely claimed that Goyal had killed a whistle-blower and their whole family and shared pictures of 24 supposed victims, claiming that one had committed suicide. By claiming that he was the subject of an arrest warrant issued by the Supreme Court, the scammers further threatened him. The scammers promised to set up an online inquiry when Bajwa stated that he was too old to fly to Mumbai for interrogation. During the inquiry, they asked him 15 questions about Naresh Goyal’s case. In an attempt to further influence him, they threatened to ruin his name by revealing his purported role in newspapers if he didn’t comply. Bajwa and his spouse were put under “digital arrest” by the scammers, who told them to never turn off their phones and to refrain from making any calls. This ten-day digital arrest took place between March 18 and March 27. The scammers forced Bajwa to divulge his ₹8.80 lakh bank account amount on March 20. Through the use of fake arrest orders and WhatsApp-shared account-freezing notifications, they coerced him into sending money via real-time gross settlement (RTGS). After receiving digital arrest threats, Bajwa transferred money to several different accounts, leaving his bank account empty. He sent ₹8 lahks on March 20, ₹60 lahks on March 21, ₹80 lakh on March 24, ₹88 lahks on March 25, and ₹1.05 crore on March 27. His wife was the next victim of the scammers in digital arrest, who persuaded him to cancel her fixed deposits (FDs) to “close the case.” The scammers made Bajwa stay on his video call for a full day to keep him under control. They would get in touch with him right away and ask him to switch it on if the call was cut off. They used several phone lines to pose as Mumbai Cyber Crime authorities. They kept calling the numbers of Bajwa and his family. After realizing he had been duped, Bajwa went to the Chandigarh cybercrime police station and lodged a report, which resulted in the filing of a case on April 1. The cyber police station received a formal complaint (FIR) filed under Sections 308, 319(2), 318(4), 336(3), 338, 340(2), and 61(2) of the BNS. From the misplaced money, the Chandigarh Police were able to retrieve ₹6 lakh. Residents have been advised by police to exercise caution and refrain from giving out money or personal information to strangers over the phone. They have recommended reporting strange calls to the cyber-crime  digital arrest helpdesk and checking with the authorities for any legal notices (1930).

STF cracks cyber fraud racket in Lucknow, arrests six including kingpin

STF cracks cyber fraud

The Uttar Pradesh STF cracks cyber fraud arrested six members of a cyber fraud gang in Vibhuti Khand, including the mastermind, for running corporate bank accounts on rent to conduct scams. Seized items included luxury cars, bank documents, electronic devices, and evidence linking them to fraud cases worth crores across India. In the Vibhuti Khand neighbourhood of the state capital, the Uttar Pradesh Special Task Force (STF) detained six members of an organized cyber fraud gang, including the mastermind. On March 29, 2025, STF said in a news release that the gang ran corporate bank accounts on rent to conduct extensive cyber scams involving online gambling, share market investments, digital arrest, and other purportedly criminal acts. During the raid, the STF also seized expensive cars, bank paperwork, and technological gadgets. The STF retrieved a driver’s license, voter ID, 18 debit and credit cards, three Aadhaar cards, three PAN cards, 11 cell phones, and 52 WhatsApp chats containing APK files and corporate bank account information. Two four-wheeler vehicles that were allegedly used in the crime as well as ₹34,500 in cash were confiscated. According to the police, around 11:05 p.m. on March 28, 2025, the STF team, led by assistant superintendent of police Vishal Vikram Singh, arrested the accused in Vibhuti Khand near the Aadhaar Card Office across from a cafe. According to the STF, the inquiry started after Lucknow-based Alex Innovation Pvt Ltd, an IT solutions company, complained about a scam involving about ₹48 lakh at the Cyber fraud Crime Police Station. According to the lawsuit, the gang’s leader, Abdul Malik, used a malicious APK file to get access to the company’s private bank account. Before the bank closed the account, he carried out almost 3,200 unauthorized transactions. Subsequent investigation verified that the transactions were connected to cyber fraud. The gang also includes Pushpendra Singh (MBA) from Rae Bareli, Vijay Kumar Pathak (PhD) from Jaunpur, Ayush Mishra (BTech) from Gorakhpur, Yaseen Ahmed alias Yasir (Class 10) from Gonda, and Syed Alim Hussain (BBA) from Gonda. According to the press release, each had a distinct function in the illegal enterprise. STF officials claim that in 2024, Malik made contact with Farhan from Lucknow, who then connected him with foreign agents Daniel from Kathmandu, Nepal, and Jackie from Pune. The gang used the promise of large commissions to entice business bank account customers. One of the gang’s main schemes was to use a private bank account in December 2024 to defraud Atex Innovation Pvt Ltd of ₹47.58 lakh. Through an Indian Overseas Bank account acquired through a Telegram contact named Nilesh Yadav from Bihar, they laundered ₹1.2 crore in January 2025. Details of ten corporate bank accounts used for cyber fraud were found on electronic devices found during the raid, and 25 more complaints were filed against the gang throughout India. The accused has been the subject of a formal complaint filed under Section 66C of the Information Technology Act and Sections 318(4), 319(2), and 111(2)(b) of the Indian Penal Code. In addition to forensic examination of the confiscated electronic devices to find more proof of the gang’s activities, STF officers revealed that attempts are still being made to track down and capture additional gang members.

Police Say Former Odisha IT Minister Loses Rs 1.4 Crore to Cybercriminals

Odisha IT Minister

Former Odisha IT Minister and MLA Tusharkanti Behera lost Rs 1.4 crore to cyber fraud, allegedly through a friend’s misuse of his trading account. Police have arrested seven suspects and frozen Rs 15 lakh while continuing the investigation. Bhubaneswar: On March 31, 2025, a top police officer here stated that an Odisha IT Minister A and former information technology minister had lost Rs 1.4 due to cyber fraud in around a month and a half.In relation to the crime, seven people were taken into custody by the police: three from Tamil Nadu and four from Karnataka. But in January, the former minister filed a police complaint in this respect, alleging that a buddy had been using his trading account and misappropriated the funds. Odisha IT Minister to say the police officer claimed that the accused and their colleagues used to pretend to be trade analysts in order to get individuals to invest money in shares, IPOs, and other trades by promising them large profits. Between November 13, 2024, and January 1, 2025, the accused obtained Rs 1.40 crore fraudulently from the complainant, according to the Crime Branch’s cybercrime unit, which conducted the inquiry, he added. Sarthak Sarangi, the IG for the Crime Branch, stated during a news conference that on January 13 of this year, “we received a complaint that cyber fraudsters swindled Rs 1.4 crore from the complainant through a mobile app.” He did not, however, identify the complainant because he believed it would interfere with the inquiry. The complainant, according to police sources, is an IIT graduate, a current Odisha IT Minister , and a former minister of information technology. However, former IT minister and BJD Odisha IT Minister Tusharkanti Behera told reporters: “My friend used my trading account and lost the money to cyber fraud.” I don’t know anything about the fraud directly. According to Sarangi, bank accounts in Karnataka, Kerala, Tamil Nadu, Telangana, West Bengal, Delhi, Himachal Pradesh, Assam, and Maharashtra have received the funds. Seven people were taken into custody by crime branch teams that were dispatched to Karnataka, Tamil Nadu, and Kerala during the first phase. “Very soon we will send our teams to Hyderabad, West Bengal and Delhi to arrest other accused persons in this case,” the officer said. According to him, the Crime Branch has frozen Rs 15 lakh in the accused individuals’ bank accounts and recovered Rs 4 lakh from them thus far.According to Sarangi, a Navy commander and a university vice-chancellor were lately the targets of cyber fraud.

Business fraud losses of 9.5 lakhs are recovered by a cybercrime team A Major Victory

Business fraud

Hyderabad Cyber Crime Unit recovered ₹9.5 lakh from fraudsters who tricked a businessman with a fake business fraud opportunity fraud. Authorities warn against upfront payment scams and advise verifying company legitimacy. A businessman who was defrauded by cybercriminals was successfully refunded ₹9,50,531 by the Hyderabad City Cyber Crime Unit. The police emphasized that the likelihood of recovering lost money can be increased by reporting such fraud right away. To receive assistance, victims can call the cybercrime helpline 1930 or visit cybercrime.gov.in. According to the police, a 32-year-old complainant in this case was tricked into sending the money to bank accounts that the scammers had offered under the guise of a business fraud opportunity. Inspector K. Prasada Rao headed a squad that located and detained the accused in Sector-7, Dwarka, New Delhi, together with SI Abhishek, HC Satish, and PCs Srinivas Reddy and Kranthi Kumar Reddy. A demand draft was used to successfully return the whole money to the victim. Authorities have issued warnings to entrepreneurs about fraudulent schemes in which fraudsters demand upfront fees for website construction, ISO certification, and registration in exchange for lucrative business fraud negotiations. It is advised that victims check the legitimacy of the company, refrain from making sizable upfront payments, and be wary of unsolicited offers.

Goa Police Bust Cybercrime Recruitment Ring, Arrest Three for Exploiting Victims

Goa Police

Goa Police arrested three individuals for defrauding people into working for cybercrime centres in Thailand and planning to expand operations internationally. PANAJI: According to the Goa Police , three persons, including a Kazakh national of Chinese descent, have been taken into custody for allegedly defrauding people into working for cybercrime centres in Thailand. On March 26, the accused, named as 22-year-old Talaniti Nulaxi, was taken into custody at Indira Gandhi International Airport in New Delhi. On that same day, authorities issued a lookout notice for him when he tried to leave the country, according to the police. Following the arrest of Adithya Ravichandran, 22, of Bengaluru, and his supervisor, Rupnarayan Gupta, 36, of Mumbai, who claimed to be operating an organization that assisted individuals in finding employment overseas, Goa Police located Nulaxi. Additionally, the gang hired victims to perpetrate forced financial fraud through WeChat, Zoom, Telegram, WhatsApp, and other social media sites. Rahul Gupta, the superintendent of Goa Police , stated that the gang held Zoom interviews and meetings to talk about how they operate. Adithya was employed by the second defendant, Rupnarayan Gupta, who owns and operates Ivanka, a Mumbai-based employment agency in Mulund West. The Ministry of External Affairs has not registered the agency to transport Indians overseas. According to Gupta, Rupnarayan forwards candidate data to recruiters overseas for interviews after receiving it from his national agents. During her five days in Bengaluru, Talaniti Nulaxi assisted with setting up a call centre. Chinese people are living in Thailand, Cambodia, and other places. They have a hierarchical, well-organized apparatus. He is a member of this wider network. Gupta added, “This is a component of the broader investigation that will continue over the next few days.” The inquiry also showed that the group was recruiting young women under the guise of “work from home,” who were subsequently used for extortion and honey traps, according to Goa’s Director General of Goa Police Alok Kumar. We are also looking into some information that has surfaced so far that suggests this group was considering opening contact centres in India, Nepal, and a few other nations they had identified that were comparable to those in Thailand, Myanmar, and Cambodia. Additionally, he was in negotiations to rent space in multi-story buildings for the same purpose, according to Alok Kumar.

Over 13 Million Indian Banking Customers’ Data Allegedly Leaked and Sold on Dark Web

Indian Banking Customers

A threat actor claims to have stolen and is selling sensitive financial data of over 13 million Indian banking customers on the dark web. A threat actor has surfaced on a well-known dark web forum, claiming to have gained access to and exfiltrated sensitive financial data belonging to over 13 million Indian banking customers. This shocking revelation has raised serious concerns about the state of data security in India’s banking ecosystem. The purported data dump, which is allegedly the product of a significant breach, is currently being offered for $10,000 to one buyer alone. Scope of the Leak According to the dark web article, the compromised data include financial and personal details like: Full names of account holders Indian Banking Customers account numbers Indian Banking Customers IFSC codes Indian Banking Customers Registered mobile numbers Indian Banking Customers Email addresses The threat actor has allegedly supplied a sample of 6,000 data from the purported breach to bolster the veracity of the claim. The entire dataset, which is 11.2 GB in size, is reportedly formatted in CSV. By declaring that only one buyer would be considered and that escrow services would be accepted to complete the transaction, the threat actor further highlighted the gravity of the sale. This unusual approach demonstrates the actor’s faith in the veracity of the breach. Top Banks Allegedly Affected The forum post claims that the customer datasets of numerous well-known Indian financial institutions are impacted by the incident, including: State Bank of India (SBI) HDFC Bank ICICI Bank Kotak Mahindra Bank Several other private and public sector banks Cyber intelligence specialists are conjecturing about a potential vulnerability exploited through third-party banking APIs or KYC data aggregators, even though the exact manner of infiltration is still unknown. Potential Risks and Implications Experts in cybersecurity caution that if confirmed, such a vulnerability might have serious repercussions: Financial fraud: Access to account numbers and phone numbers could allow cybercriminals to launch targeted phishing or vishing attacks. Identity theft: The combination of email, phone numbers, and bank data could allow for large-scale impersonation and KYC fraud. Reputational damage: If major banks are indeed involved, the fallout could impact consumer trust and regulatory compliance in the fintech space. A senior analyst at a top cybersecurity company declared, “This is not just a leak; if verified, it’s a bombshell.” The scale and extent point to either extreme neglect or a profound penetration. By using escrow, the seller demonstrates their expertise in high-value cybercrime activities. Authorities and Institutions on Alert The Reserve Bank of India (RBI) and the Indian Computer Emergency Response Team (CERT-In) have not yet released a formal statement. Additionally, no confirmations or rejections have been made by representatives of the banks listed in the leak. Dark Web Marketplace Trends This hack is just one more illustration of how the dark web is developing into a marketplace for strategic and private information. Threat actors are increasingly acting like businesses by offering escrow, negotiating exclusive deals with buyers, and supplying samples. Because of the growth of fintech apps and digital banking, there is still a high demand for banking data in particular. Previous instances have demonstrated how these leaks support account takeovers, loan fraud, and social engineering.

Crackdown on digital fraud by the Indian government: What to anticipate soon

digital fraud

India is ramping up digital security by blocking millions of fraudulent SIM cards and accounts while implementing AI-driven measures to combat cybercrime. With cyber fraud on the rise, the Indian government has been intensifying its efforts to safeguard digital security. Over the past few months, they have reportedly blocked more than 7.8 lakh SIM cards, 83,000+ WhatsApp accounts, and 3,000+ Skype IDs. The government has also taken a firm stand against online threats. But what does this mean for the future of India’s cybersecurity? Government’s crackdown on digital fraud Sanjay Kumar, Minister of State for Home Bundi of the Union, has recientemente revealed in the Lok Sabha que India has imposed stringent medidas against ciberdelincuentes. In addition to outlawing fake SIM cards, the government has deactivated 2,08,469 IMEI numbers, which is a crucial step in preventing misuse of devices that have been damaged or obtained illegally. Tighter regulations on messaging and video platforms Currently, authorities focus on messaging and video chatting apps, which are frequently used for fraudulent purposes. Already, the Indian Cyber Crime Coordination Centre (I4C) has detected and blocked: 3,962 Skype IDs 83,668 WhatsApp accounts This action suggests that stricter regulations may be implemented in digital fraud communication networks to reduce abuse. I4C and the Future of Cybercrime Prevention I4C, which was established in 2021, has played a crucial role in preventing financial fraud. It has already contribution a salvaguardar Rs 4,389 crore on possible presides de mas de 13.36 lakh reclamations. As cryptocurrency develops, more cryptocurrency monetization systems driven by artificial intelligence and time after quick responses to digital fraud crimes are anticipated. What’s Next? AI-powered cybersecurity measures It is anticipated that the government will use AI-powered monitoring technologies to quickly identify questionable activity. Future initiatives may include:  Automated fraud detectors for telecommunications services financier’s  Mas strictest medias KYC (Know Your Customer) para la emission de SIM cards Citizen-centric cybersecurity In initiatives To enable a person to report and monitor cases of cyber fraud, the government has implemented: 1930’s National Cyber Helpline for prompt fraud reporting Sanchar Saathi Portal and app that enables users to block stolen devices and report fake calls India is moving closer to a more secure digital fraud future by putting these measures into place, which will give its citizens more protection against cyberattacks.

Uttarakhand Police Bust International Cybercrime Gang, Arrest Two

Uttarakhand Police

Uttarakhand Police arrested two cyber criminals involved in international fraud using fake business accounts and cryptocurrency transactions. The accused operated via Telegram, earning commissions by converting illicit funds into Indian currency. Dehradun: The Uttarakhand Police claimed to have busted a gang of international cybercriminals by arresting two of its members, including a trainer, who is a tenth pass out, officials said. The Special Task Force (STF) also found huge funds in the shape of cryptocurrency in the mobile phones of the accused. The accused Harjinder Singh and Sandeep Singh would provide fake business accounts to other cybercriminals to transact money and exchange funds with international gangs in cryptocurrencies. This comes weeks after the central government brought 540 Indians back from Myanmar, who were trafficked by a Chinese network of cyber criminals on the pretext of jobs in Thailand. At least 22 of the victims were from Uttarakhand Police, which prompted the state government police to form an STF under the supervision of Senior Superintendent of Police (SSP) Navneet Bhullar. Uttarakhand Police Following the joint probe with CBI and the Indian Cyber ​​Crime Coordination Centre (I4C), two persons, Harjinder Singh and Sandeep Singh, were arrested near Zila Panchayat Chungi on Thanon Road ahead of Maharana Pratap Chowk under the Raipur Police Station area. The STF team recovered one laptop, seven mobile handsets, one passport, two chequebooks, three debit cards, two PAN cards, one passbook, one stamp seal and four SBI bank forms stamped in the name of some firm from the possession of the accused. According to officials, Sandeep and Harjinder, both friends, would use Telegram to connect with criminals and open fake bank accounts under various firm names for cybercriminals to use for illegal transactions globally. Later, they would receive payments in cryptocurrency (USDT), take a 1% fee per transaction and convert it into Indian currency. “Over the past year, the accused made about Rs 1.2 crore in profit, including Rs 25 lakh in March alone,” officials added.